We can distinguish two (unfortunately common) further types of attack,
being general denial of service by flooding (all too easy with
multicast or reflectors) and traffic flow (source destination matrix)
analysis. Defenses against these range from the introduction of
inter-router authentication, to the generation of uniform random
traffic noise that is reduced as real traffic is added. Charging
for traffic also helps deter the former problem. A scenario that
represents an extreme case of potential paranoia where we would be
concerned with these attacks is that of an Mbone based Share Auction.